We’re excited to introduce a powerful new capability in the Upwind Cloud Security Platform –  enhancing security by providing seamless visibility into highly privileged identities for every containerized resource in your cloud environment. Now available directly in the Upwind Topology Map, this feature helps detect and mitigate excessive permissions, reducing the risk of privilege escalation attacks and unauthorized access.

Screenshot of a software dashboard showing a map and an overview. The map on the left displays nodes and connections. The overview on the right contains details about Kubernetes deployment and resources, including error messages and resource names.

This enhancement makes it even easier to visualize Upwind’s runtime-driven approach, going beyond traditional CWPP solutions. It correlates real-time network topology, privileged identities, posture misconfigurations, threats, vulnerabilities, and API weaknesses – giving you deeper contextualized security insights to prioritize actual risks.

With this update, you can now easily view high-privilege source information, including:

  • Cloud IAM High-Privilege Roles
  • Kubernetes High-Privilege Roles
  • Kubernetes Security Context
  • Pivot to Cloud – K8s Resources with Cloud Permissions
A network map interface from Upwind shows various nodes and connections, including Kubernetes clusters and AWS resources. A legend details resource states with colored icons, and a sidebar features options like cloud accounts and assets.

This granular identity insight makes it even easier to rapidly assess resource risk context and proactively remediate unnecessary privileges, which ensures stronger protection for your most critical cloud assets. Among other benefits, it helps identify overly permissive Kubernetes service accounts that could allow unintended access to cloud resources, reducing the risk of lateral movement by attackers.

User interface displaying a network map with interconnected nodes and services labeled AWS, Azure, MongoDB, and DNS. A dropdown menu shows filters for resources, with options like AWS and DNS. Various system components and paths are highlighted.

By leveraging Upwind’s correlated container and identity security capabilities, security teams can connect identity risk with vulnerabilities, threats, posture findings, and APIs, achieving holistic protection across containerized environments. To learn how to start correlating identity context with risk findings, schedule a demo today.